Name:backup theft, corruption, or destruction

Backups protected less comprehensively than on-line copies of
information are attacked. Examples include the placement of magnetic
devices in backup storage areas in order to erase or corrupt magnetic
backups, the infection of backup media by computer viruses, and the theft of
backup media being disposed near the end of its life-cycle.

Complexity: Except in cases where backup information is encrypted, back-up
attacks are straightforward and introduce little complexity. In the case of
aging backup tapes some signal processing capabilities may be required in
order to reliably read sections of media, but this is not very complex or
expensive.
fc@red.a.net